CYBERSECURITY CROSSWORD

12345678910111213141516171819202122
Across
  1. 2. Paranoia with governance—and for once that’s a compliment.
  2. 4. Cybercriminal Group that treats mass extortion like a quarterly business plan.
  3. 6. One zeroday log message to rule them all—and to invite remote code execution in for tea.
  4. 10. “When an attacker pretends to be you… which is rude, because you barely want to be you on Mondays.”
  5. 14. The door that was “definitely locked” until someone checked the logs.
  6. 15. Thousands of machines working together to ruin someone’s day. Teamwork!
  7. 16. The bug that made everyone learn what memory feels like when it overshares
  8. 19. The business model that turns backups from “nice to have” into “board‑level KPI.”
  9. 20. “Did someone say free database access?”
  10. 21. Not a horse, but still extremely good at hosting guests you didn’t invite.
  11. 22. The file transfer brand that learned what “blast radius” means.
Down
  1. 1. Your network’s bouncer; denies service to anyone not on the list (and some who are).
  2. 3. Why adversaries hack who you trust instead of hacking you—because efficiency matters, even in crime.
  3. 5. A deliciously fake host that flatters attackers into oversharing their techniques.
  4. 7. That “urgent password reset” that somehow always lands 5 minutes before lunch.
  5. 8. words -
  6. 9. Your keyboard’s diary—written without consent.
  7. 11. The franchised ransomware brand with more press releases than your product launch.
  8. 12. This malware name is brutally honest.
  9. 13. When bash said: ‘I’ll run whatever you put in here, no questions asked.’
  10. 17. When sensitive information goes on an unsanctioned field trip.
  11. 18. The internet’s basement—less spiders than expected, more stolen credentials than desired.